[<prev] [next>] [day] [month] [year] [list]
Message-ID: <165427350.20070711122932@SECURITY.NNOV.RU>
Date: Wed, 11 Jul 2007 12:29:32 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: bugtraq@...urityfocus.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: durito: enVivo!CMS SQL injection
Dear bugtraq@...urityfocus.com,
durito [damagelab] -durito[at]mail[dot]ru- reported SQL injection
vulnerability in enVivo!CMS through ID parameter of default.asp.
Example:
http://www.example.com/default.asp?action=article&ID=-1+or+1=(SELECT+TOP+1+username+from+users)--
Original message (in Russian): http://securityvulns.ru/Rdocument425.html
--
http://securityvulns.com/
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/
Powered by blists - more mailing lists